{"id":3540,"date":"2019-10-30T10:23:25","date_gmt":"2019-10-30T10:23:25","guid":{"rendered":"https:\/\/www.adlice.com\/?p=3540"},"modified":"2022-12-21T10:31:38","modified_gmt":"2022-12-21T10:31:38","slug":"avoid-being-hacked-ultimate-guide","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/de\/avoid-being-hacked-ultimate-guide\/","title":{"rendered":"How to Avoid Being Hacked: The Ultimate Guide"},"content":{"rendered":"\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">AVOID BEING HACKED: INTRODUCTION<\/p>\n\n\n\n<p>With the development of broadband Internet connections, online\/cloud-based services have become more and more numerous. <strong>Your data is not only located on your computer<\/strong> anymore but <strong>on a multitude of online servers<\/strong>. Not only you now should consider what could happen <strong>if your computer gets infected<\/strong>, but you must also consider what could happen if <strong>one of your online accounts gets compromised<\/strong>.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">POSSIBLE ISSUES<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Theft<\/strong>. Your computer is infected by some malware or an online service is compromised, and <strong>the attacker stole private files <\/strong>that you REALLY do not want to be exposed online.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identity Theft<\/strong>. After an attacker has obtained specific data, they are able to <strong>impersonate yourself<\/strong> and use this for nefarious purposes.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Loss.<\/strong> Some malware authors specialize in creating malware that are designed to <strong>encrypt the files<\/strong> on your computer and <a href=\"https:\/\/www.adlice.com\/ransomware-spreading-prevention\/\">ask for a ransom<\/a> to recover them. Data loss is not only linked to malicious activities, losing your laptop or catastrophic <strong>hard disk failures<\/strong> are also common causes.<\/li>\n<\/ul>\n\n\n\n<p>All of the issues described above can be avoided most of the times with <strong>good practices<\/strong>. You can <strong>prevent your computer from being infected<\/strong>, and you can limit the damages if an <strong>online account is compromised<\/strong>. Let&#8217;s have a look how.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">AVOID BEING INFECTED<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">UPDATE YOUR SOFTWARE<\/p>\n\n\n\n<p><a href=\"https:\/\/www.adlice.com\/exploit-kits-part-1\/\">Software vulnerabilities<\/a> can be used to install malware on your machine. Using <strong>only maintained software<\/strong> where such vulnerabilities are fixed is recommended against infection propagation. Also, making <strong>regular operating system and software updates<\/strong> is a strong advice to stay away from possible exploitations.<\/p>\n\n\n\n<p>We recommend to <a href=\"https:\/\/www.adlice.com\/ucheck\/\" target=\"_blank\" rel=\"noreferrer noopener\">download and install UCheck<\/a>, and make regular scans and updates. If you are a Premium user, this is even easier if you enable the Automatic Software updates.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/12\/ucheck_results.png\"><img decoding=\"async\" width=\"816\" height=\"538\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/12\/ucheck_results.png\" alt=\"ucheck\" class=\"wp-image-2464\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/12\/ucheck_results.png 816w, https:\/\/www.adlice.com\/wp-content\/uploads\/2018\/12\/ucheck_results-300x198.png 300w\" sizes=\"(max-width: 816px) 100vw, 816px\" \/><\/a><\/figure>\n<\/div>\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">BLOCK (DANGEROUS) ADS<\/p>\n\n\n\n<p><strong>Many websites display advertisements<\/strong>, of multiple types: There is classic (non-intrusive) ads, the annoying ads (displaying pop-ups, misleading buttons and such) and the <strong>malicious ads<\/strong>. The later are (obviously) the most dangerous, they can scare the user with <a href=\"https:\/\/en.wikipedia.org\/wiki\/Technical_support_scam\">fake error messages<\/a> or even download and install malware <a href=\"https:\/\/en.wikipedia.org\/wiki\/Drive-by_download\">without any interaction<\/a> (drive by download). If you block ads, you close another door.<\/p>\n\n\n\n<p><strong>Installing an ad blocker<\/strong> will prevent this kind of attack. We recommend <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/ublock-origin\/cjpalhdlnbpafiamejdnhcphjbkeiagm\">uBlock Origin<\/a> because of its effectiveness, low memory footprint, wide support and compatibility. Site note: <strong>please be responsible<\/strong> and deactivate the extension on websites you want to support.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image dt-pswp-item\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/scam_popup_wolfstreet.com_.png\"><img decoding=\"async\" width=\"1024\" height=\"560\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/scam_popup_wolfstreet.com_-1024x560.png\" alt=\"\" class=\"wp-image-3543\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/scam_popup_wolfstreet.com_-1024x560.png 1024w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/scam_popup_wolfstreet.com_-300x164.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/scam_popup_wolfstreet.com_.png 1250w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Example of &#8220;Tech scams&#8221;, Source: wolfstreet.com<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">INSTALL AN ANTIVIRUS + ANTIMALWARE<\/p>\n\n\n\n<p><strong>The antivirus is the first barrier of protection<\/strong> against malware when they have reached your computer, so it is important to install an effective one. If you are using Windows 10, Windows Defender Antivirus is our recommended one. If you are using an older version of Windows, <a href=\"https:\/\/www.avira.com\/en\/free-antivirus-windows\">Avira Free Antivirus<\/a> or<a href=\"https:\/\/www.kaspersky.com\/free-antivirus\"> Kaspersky Security Cloud Free<\/a> will be your choice. On Windows XP, <a href=\"https:\/\/www.pandasecurity.com\/en-us\/homeusers\/solutions\/free-antivirus\/\">Panda Dome Free Antivirus<\/a> is the product you should use (with considering an upgrade&#8230;)<\/p>\n\n\n\n<p><strong>A second layer of protection<\/strong> is one based on heuristics (next-gen anti-malware) and is mostly used to prevent against unknown threat. Our flagship product <a href=\"https:\/\/www.adlice.com\/download\/roguekiller\/\" target=\"_blank\" rel=\"noreferrer noopener\">RogueKiller Premium<\/a> (starting at version 14) does quite the job and includes both malware protection and <strong>documents protection<\/strong> (to avoid your files being held for ransom).<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/rk14.png\"><img decoding=\"async\" width=\"1024\" height=\"425\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/rk14_detection2-1024x425.png\" alt=\"\" class=\"wp-image-3564\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/rk14_detection2-1024x425.png 1024w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/rk14_detection2-300x125.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/rk14_detection2.png 1778w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">NEVER OPEN ATTACHEMENTS FROM UNKNOWN SENDERS<\/p>\n\n\n\n<p><strong>Spam campaigns are still an important way to infect machines<\/strong>, usually under the form of Office documents <a href=\"https:\/\/www.adlice.com\/macro-malware-the-biggest-online-threat\/\">containing malicious macros<\/a>. If your antivirus does not detect malicious code in the attachment, that doesn\u2019t mean it\u2019s not malicious. As a rule of thumb, <strong>if you do not know the sender<\/strong>, do not click on any link contained in the email body or open attached files.<\/p>\n\n\n\n<p>Another important rule is to <strong>never ever blindly trust what the received emails are saying<\/strong>. Most spam campaigns rely on social engineering using blackmail, bait or any technique to <strong>make people click on a link or open a file<\/strong>. The content may be <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sextortion\">scary<\/a>, promising, or questionable. This is made on purpose, just move them to the junk folder.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">AVOID USING ACTIVATORS \/ CRACKS \/ KEYGENS<\/p>\n\n\n\n<p>Software activators, or cracks\/keygens are small pieces of software that <strong>promise you the use of a paid software for free<\/strong>. Generally speaking, 10% of them are working properly, 40% are buggy (but harmless) and <strong>50% of them are pieces of malware<\/strong>, <a href=\"https:\/\/www.adlice.com\/kms-activators-analysis\/\">waiting to be executed<\/a>. <\/p>\n\n\n\n<p>Most of them also ask to <strong>turn off the Antivirus<\/strong>, so if you choose to activate a software with such a way it&#8217;s like playing &#8220;Russian Roulette&#8221;. Instead we recommend to either <strong>pay the software<\/strong> (look or ask directly for discounts), or use <a href=\"https:\/\/alternativeto.net\/\">free alternatives<\/a> (Linux, Open Office, &#8230;).<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image dt-pswp-item\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/keygen.jpg\"><img decoding=\"async\" width=\"311\" height=\"358\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/keygen.jpg\" alt=\"\" class=\"wp-image-3549\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/keygen.jpg 311w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/keygen-261x300.jpg 261w\" sizes=\"(max-width: 311px) 100vw, 311px\" \/><\/a><figcaption class=\"wp-element-caption\">An old activator for Adobe Acrobat Pro<\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">GOOD PRACTICES<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">NEVER USE THE SAME PASSWORD TWICE<\/p>\n\n\n\n<p><strong>Everytime you create a new account online<\/strong>, they ask you for an email and password. The password is most of the time encrypted on their end, but not always (due to poor practices). <\/p>\n\n\n\n<p>If for some reason <strong>the service gets hacked<\/strong>, your email and password will be in the hands of hackers, who will <strong>try it on other services<\/strong> to hack all your accounts at once. This is why we recommend to <strong>never reuse a password<\/strong>. This is a hard advice, but we have solutions below so keep reading&#8230;   <\/p>\n\n\n\n<p>If you suspect an account is compromised, or just want to verify it&#8217;s not, you can search on <a href=\"https:\/\/haveibeenpwned.com\/\">haveibeenpwned<\/a> with your email address.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">USE A PASSWORD MANAGER<\/p>\n\n\n\n<p><strong>Remembering passwords is complicated<\/strong>, and impossible if you use 1 password per service (as recommended above). Fortunately there&#8217;s now services available on all devices (computer, smartphones, tablets&#8230;) that <strong>create and remember the passwords for you<\/strong>. They are even able to fill the forms for you, so that you don&#8217;t even need to copy or type it.<\/p>\n\n\n\n<p><strong>We don&#8217;t recommend storing passwords in the browser<\/strong> (like with Firefox), because it&#8217;s possible for hackers to steal the database files with all your passwords on your machine. Instead, we recommend <a href=\"https:\/\/www.lastpass.com\/\">cloud services like LastPass<\/a>. You just need to remember one password (master password) to access and unlock your account, then your &#8220;vault&#8221; is accessible on all your devices.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1024\" height=\"420\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/lastpass-1024x420.png\" alt=\"\" class=\"wp-image-3571\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/lastpass-1024x420.png 1024w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/lastpass-300x123.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/lastpass.png 1895w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">USE 2FA WHEN POSSIBLE<\/p>\n\n\n\n<p>2FA (for two-factor authentication) is a <strong>way to authenticate a user<\/strong> with something additional to its password. This additional verification is performed by using \u201csomething that only the user possesses\u201d. Most of the time it&#8217;s a <strong>SMS received<\/strong> on a smartphone, <strong>or a token<\/strong> (hardware or software).<\/p>\n\n\n\n<p>Some services provide a way to recognize 2FA authentification, which <strong>enforces the security of your account<\/strong>. If that&#8217;s the case we encourage you to enable it. Most popular (and stable) solutions for software token (unique codes randomly generated) are available for both Android and IPhone, <a href=\"https:\/\/authy.com\/\">Authy <\/a>and <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2\">Google Authenticator<\/a>.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#f39c12\"><u>Important<\/u> : Don&#8217;t forget to store your recovery codes when enabling the service.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">GREEN PADLOCK DOES NOT EQUAL SAFE<\/p>\n\n\n\n<p>One of the common myths of Internet security is concerning the <strong>padlock displayed by the browser when visiting a website<\/strong>: if the padlock is closed and highlighted in green colour, the site is safe. In reality, the site MIGHT be safe, but it\u2019s not always the case. <\/p>\n\n\n\n<p>Malware author are <strong>using this myth to trick the users<\/strong> into trusting them. A green padlock means that the <strong>data transmitted between the computer and the website is encrypted<\/strong>, that&#8217;s it. The examples below are from a malicious website that tries to impersonate sophos.com.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL.png\"><img decoding=\"async\" width=\"381\" height=\"38\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL.png\" alt=\"\" class=\"wp-image-3555\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL.png 381w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL-300x30.png 300w\" sizes=\"(max-width: 381px) 100vw, 381px\" \/><\/a><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL_2.png\"><img decoding=\"async\" width=\"335\" height=\"129\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL_2.png\" alt=\"\" class=\"wp-image-3557\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL_2.png 335w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/fake_URL_2-300x116.png 300w\" sizes=\"(max-width: 335px) 100vw, 335px\" \/><\/a><\/figure>\n<\/div>\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#16a085\">BACKUP EARLY, BACKUP OFTEN<\/p>\n\n\n\n<p><strong>Backups are your safety wheel in case of trouble<\/strong>. They won&#8217;t help you not to crash, but they&#8217;ll definitely <strong>help you to recover<\/strong>. There&#8217;s 3 rules to follow with backups:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Backup early<\/strong> (as soon as you have valuable data to save)<\/li>\n\n\n\n<li><strong>Backup often<\/strong> (every day \/ week, depending on the amount and changes)<\/li>\n\n\n\n<li><strong>Test your backups<\/strong> (verify they are properly saved and recoverable)<\/li>\n<\/ul>\n\n\n\n<p>Nowadays there&#8217;s quite a few ways to backup your data: <strong>locally<\/strong> (with external drives or NAS) or by using a <strong>cloud service<\/strong> (Google Drive, Dropbox). Unfortunately, <strong>setting up one of these is not enough<\/strong>. <\/p>\n\n\n\n<p>Whatever method you choose will still be vulnerable to <strong>hardware failure or unwanted data encryption<\/strong> (ransomware). If your NAS is available on the network a Ransomware will find it, same for a cloud account. An external drive can be stolen, burnt, or anything you can imagine. <\/p>\n\n\n\n<p>A recommended way is to <strong>have at least 3 different backups<\/strong> (of the same data), in different locations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The first copy<\/strong> is stored on your local hard drive or on a NAS (working copy)<\/li>\n\n\n\n<li><strong>The second copy<\/strong> is stored on a cloud storage service (online copy)<\/li>\n\n\n\n<li> <strong>The third copy<\/strong> is stored on an external hard drive, not connected to the network (offline copy) <\/li>\n<\/ul>\n\n\n\n<p>We recommend <a href=\"https:\/\/www.synology.com\/\">Synology NAS<\/a> and cloud services like <a href=\"https:\/\/www.google.com\/intl\/en_EN\/drive\/\">Google Drive<\/a> or <a href=\"https:\/\/www.dropbox.com\/\">Dropbox<\/a>.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"680\" height=\"300\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/CloudStation.png\" alt=\"\" class=\"wp-image-3573\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/CloudStation.png 680w, https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/CloudStation-300x132.png 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>With the development of broadband Internet connections, online\/cloud-based services have become more and more numerous. Your data is not only located on your computer anymore but on a multitude of online servers. Not only you now should consider what could happen if your computer gets infected, but you must also consider what could happen if one of your online accounts gets compromised.<\/p>\n","protected":false},"author":1,"featured_media":3559,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103,1],"tags":[52,107,577,8,607],"class_list":["post-3540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guide","category-uncategorized","tag-antivirus","tag-guide","tag-hack","tag-malware","tag-updates","category-103","category-1","description-off"],"views":6116,"yoast_score":77,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Avoid Being Hacked | Ultimate Guide \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Learn the best practices to avoid being hacked. Password policies, security software, virus protection, and more. This is the ultimate guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Avoid Being Hacked | Ultimate Guide \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Learn the best practices to avoid being hacked. Password policies, security software, virus protection, and more. This is the ultimate guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-30T10:23:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1276\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"How to Avoid Being Hacked: The Ultimate Guide\",\"datePublished\":\"2019-10-30T10:23:25+00:00\",\"dateModified\":\"2022-12-21T10:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/\"},\"wordCount\":1453,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg\",\"keywords\":[\"antivirus\",\"guide\",\"hack\",\"malware\",\"updates\"],\"articleSection\":[\"Guide\",\"Uncategorized\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/\",\"url\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/\",\"name\":\"How to Avoid Being Hacked | Ultimate Guide \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg\",\"datePublished\":\"2019-10-30T10:23:25+00:00\",\"dateModified\":\"2022-12-21T10:31:38+00:00\",\"description\":\"Learn the best practices to avoid being hacked. Password policies, security software, virus protection, and more. This is the ultimate guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg\",\"width\":1920,\"height\":1276},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Avoid Being Hacked: The Ultimate Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/de\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid Being Hacked | Ultimate Guide \u2022 Adlice Software","description":"Learn the best practices to avoid being hacked. Password policies, security software, virus protection, and more. This is the ultimate guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/","og_locale":"de_DE","og_type":"article","og_title":"How to Avoid Being Hacked | Ultimate Guide \u2022 Adlice Software","og_description":"Learn the best practices to avoid being hacked. Password policies, security software, virus protection, and more. This is the ultimate guide.","og_url":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2019-10-30T10:23:25+00:00","article_modified_time":"2022-12-21T10:31:38+00:00","og_image":[{"width":1920,"height":1276,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Verfasst von":"tigzy","Gesch\u00e4tzte Lesezeit":"8\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"How to Avoid Being Hacked: The Ultimate Guide","datePublished":"2019-10-30T10:23:25+00:00","dateModified":"2022-12-21T10:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/"},"wordCount":1453,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg","keywords":["antivirus","guide","hack","malware","updates"],"articleSection":["Guide","Uncategorized"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/","url":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/","name":"How to Avoid Being Hacked | Ultimate Guide \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg","datePublished":"2019-10-30T10:23:25+00:00","dateModified":"2022-12-21T10:31:38+00:00","description":"Learn the best practices to avoid being hacked. Password policies, security software, virus protection, and more. This is the ultimate guide.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2019\/10\/padlock-428549_1920.jpg","width":1920,"height":1276},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/avoid-being-hacked-ultimate-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/de\/"},{"@type":"ListItem","position":2,"name":"How to Avoid Being Hacked: The Ultimate Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/3540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/comments?post=3540"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/3540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media\/3559"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media?parent=3540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/categories?post=3540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/tags?post=3540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}